Microsoft pays out $28K to IE bug hunters in its first-ever bounty program
Security expert calls it a success -- enough bugs to fill one or two IE updates -- even though the dollar amount was about the same as Google's for the last iteration of Chrome
Computerworld - Microsoft today announced that it had paid more than $28,000 in rewards to researchers for its first bug bounty program, a one-month special it ran during the summer for the preview version of Internet Explorer 11 (IE11).
While Microsoft trumpeted the amount, it was actually only $1,000 more than Google paid outside researchers last week for reporting flaws in the latest version of the search company's Chrome browser, and about 10% of what Google has forked over so far this year to security researchers.
"The amount of money really only matters if their offer was way off base from other programs," said Andrew Storms, director of DevOps at cloud security vendor CloudPassage. "They [only] have to pay enough to entice people to report the bugs. On the other hand, those people who are more prone to sell their vulnerabilities on the black market are still going to do so."
Microsoft kicked off its IE11 Preview Bug Bounty program June 26, when it said it would pay researchers up to $11,000 for each IE11 vulnerability they found and reported through July 26.
At the launch of the bounty -- the first Microsoft initiative that paid researchers for each unknown vulnerability they reported -- Katie Moussouris, a senior security strategist lead with the company, said the IE11 program was designed to get researchers to file vulnerabilities during the browser's beta test run, a time when third-party bug brokers have declined to purchase flaws.
According to a page that spelled out the IE11 bug bounty results, Microsoft paid six researchers for reporting 15 bugs in the browser.
James Forshaw of Context Security walked off with $9,400 for submitting four IE11 flaws and pointing out some design vulnerabilities; Jose Antonio Vazquez Gonzalez of Yenteasy Security Research earned $5,500 for five bugs; Google engineers Ivan Fratric and Fermin J. Serna were awarded $1,100 and $500 for one vulnerability each; independent researcher Masato Kinugawa got $2,200 for a pair of bugs; and Peter Vreugdenhil of Exodus Intelligence reported one vulnerability.
Although Microsoft said that Vreugdenhil requested that his payment be withheld from publication, some quick arithmetic using Microsoft's claim of over $28,000 indicated he was paid approximately $10,000.
Both Forshaw and Vreugdenhil are former winners at the Pwn2Own hacking contest, one of each year's highest-profile challenges. Forshaw received $20,000 for hacking Java in March at the 2013 Pwn2Own, while Vreugdenhil was a $10,000 winner at the 2010 edition.
Fratric is also well known: In 2012, before he joined Google, he won second place and $50,000 in Microsoft's BlueHat Prize, a contest the Redmond, Wash. company launched to acquire new technologies to block return-oriented programming, or ROP, a technique often used to sidestep DEP, or data execution prevention, one of Windows' main anti-exploit technologies.
Storms rated the IE11 program a success, if only because, as Microsoft's first true bug bounty, it was a milestone. But he also characterized the quantity of reported vulnerabilities as "a healthy number" in an interview via instant message today.
"If you consider the number of CVEs for IE patched on any given Patch Tuesday, this lot probably represents one or two months of IE bulletins," Storm said.
Microsoft will release the final of IE11 for Windows 8 and Windows RT on Oct. 17, when it offers the Windows 8.1 update to current users. IE11 on the more popular Windows 7 is to ship some time this fall.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts